Need a penetration test?
Contact us for a no-obligation conversation about your security needs.
Contact usManagement of profiles for your collaborators and end users must be thought through early in the development process. This involves defining different access and authorization profiles so that each person can only access the data they actually need.
It all starts with use of unique and individual identifiers, whether it concerns users of your application or development collaborators.
Make sure to require authentication before any access to personal data, in accordance with CNIL’s recommendations.
To ensure that each person (user or collaborator) can only access the data they actually need, your system must offer differentiated access control (reading, writing, deletion, etc.) based on the user’s needs. A global mechanism for user profile management makes it possible to group different rights by roles that a group of users exercises within the application.
Management of user profiles can be combined with logging systems to track activities and detect security-related events, such as fraudulent access or misuse of personal data. These systems must not be used for purposes other than ensuring correct use of the IT system. Logs must also not be retained longer than necessary – generally a period of six months is appropriate.
You can also plan code audits or penetration tests in your development environment to ensure the robustness of your profile management system.
Plan to document or automate the transition of your employees. For example, there should be established procedures for what actions should be taken when a person no longer has authorization to a location or an IT resource, or when their contract expires.
Management of your users and collaborators requires regular review of permissions, as use and organizational structure change in your project. Use of directory services like Lightweight Directory Access Protocol (LDAP) can help you monitor these changes and fine-tune your access strategies – for example by assigning roles based on user profiles. This helps you better comply with the principle of least privilege (least privilege).
Use of “supreme” accounts (e.g., root, administrator, etc.) should be avoided for ordinary operations, as they constitute a critical part of your system and are an obvious target for potential attackers. We recommend:
Promote adoption of a password manager in your project and the transition to strong authentication where possible. Avoid generic accounts shared by multiple people.
Contact us for a no-obligation conversation about your security needs.
Contact us